public inbox for pgsql-announce@postgresql.org
help / color / mirror / Atom feedFrom: pgAdmin Development Team via PostgreSQL Announce <announce-noreply@postgresql.org>
To: PostgreSQL Announce <pgsql-announce@lists.postgresql.org>
Subject: pgAdmin 4 v9.15 Released
Date: Mon, 11 May 2026 16:45:42 +0000
Message-ID: <177851794230.851.10919277514111552494@wrigleys.postgresql.org> (raw)
The pgAdmin Development Team is pleased to announce pgAdmin 4 version 9.15.
This release of pgAdmin 4 includes 19 bug fixes and new features. For more details please see the release notes at:
<https://www.pgadmin.org/docs/pgadmin4/9.15/release_notes_9_15.html;
pgAdmin is the leading Open Source graphical management tool for PostgreSQL. For more information, please see:
<https://www.pgadmin.org/;
**Notable changes in this release include:**
## Features
- Allow the Docker container image to run as a non-default user via the `PUID` and `PGID` environment variables.
## Bugs/Housekeeping
- Fix cross-user data access and shared-server privilege escalation in server mode (**CVE-2026-7813**).
- Tighten Shared Server feature parity, owner-only field handling, and write guards as a follow-up to the data-isolation hardening.
- Fix stored cross-site scripting (XSS) via crafted PostgreSQL object names rendered in the Browser Tree and Explain Visualizer (**CVE-2026-7814**).
- Fix SQL injection in the Maintenance tool option values (**CVE-2026-7815**).
- Fix OS command injection in Import/Export query export (**CVE-2026-7816**).
- Fix local-file inclusion and server-side request forgery in the LLM API configuration endpoints (**CVE-2026-7817**).
- Fix unsafe deserialization in the session manager that could lead to remote code execution (**CVE-2026-7818**). This change also encrypts session files at rest using Fernet, restricts session-file and `DATA_DIR` permissions to `0o600`, switches the session-digest default from SHA-1 to SHA-256, and drops several non-roundtrippable live objects from the session.
- Fix symlink-based path traversal in the file manager (**CVE-2026-7819**).
- Fix account-lockout bypass on Flask-Security's default `/login` view so the `locked` field is honored on every authentication path (**CVE-2026-7820**).
- Use absolute paths for `a2enmod` and `a2enconf` in the Debian setup script so it works when `/usr/sbin` is not on `PATH`.
- Bump Python and JavaScript runtime/development dependencies, and upgrade ESLint to v10.
- Update the Czech, Italian, Russian, Spanish, and Swedish translations.
## Deprecations
- The **BigAnimal** cloud deployment integration is deprecated and will be removed in the next version of pgAdmin 4.
---
Builds for Windows and macOS are available now, along with a Python Wheel, Docker Container, RPM, DEB Package, and source code tarball from:
<https://www.pgadmin.org/download/;
reply
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Reply to all the recipients using the --to and --cc options:
reply via email
To: pgsql-announce@postgresql.org
Cc: announce-noreply@postgresql.org, pgsql-announce@lists.postgresql.org
Subject: Re: pgAdmin 4 v9.15 Released
In-Reply-To: <177851794230.851.10919277514111552494@wrigleys.postgresql.org>
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
This inbox is served by agora; see mirroring instructions
for how to clone and mirror all data and code used for this inbox